|Publication number||US6985588 B1|
|Application number||US 09/699,832|
|Publication date||10 Jan 2006|
|Filing date||30 Oct 2000|
|Priority date||30 Oct 2000|
|Also published as||CA2427498A1, CA2427498C, CN1287247C, CN1474966A, EP1374013A2, WO2002037246A2, WO2002037246A3|
|Publication number||09699832, 699832, US 6985588 B1, US 6985588B1, US-B1-6985588, US6985588 B1, US6985588B1|
|Inventors||Barry J. Glick, Ronald S. Karpf, Mark E. Seiler|
|Original Assignee||Geocodex Llc|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (40), Referenced by (97), Classifications (28), Legal Events (6)|
|External Links: USPTO, USPTO Assignment, Espacenet|
1. Field of the Invention
The present invention relates to the communication of digital information, and more particularly, to methods and systems for controlling interchange of digital information using a location integrity attribute associated with the digital information.
2. Description of Related Art
Rapid advances in computer, telecommunications and networking technology have enabled an avalanche of new opportunities and applications that were impossible just a few years ago. These advances are exemplified by the explosive growth in popularity of the Internet. As known in the art, the Internet is an interconnection of computer networks that enables computers of all kinds to communicate with each other and share information. Companies, individuals, government agencies, charitable organizations, and academic centers, of all sizes, regularly use the Internet to share information, deliver services, and exchange a wide range of content. The Internet functions as a distributed network of systems that is neither controlled nor managed by any one entity. Physical and logical pathways that facilitate the exchange of information connect these networks to each other.
In spite of the tremendous value that this information access has brought to society, there are also enormous costs associated with the uncontrolled flow of information. One of the most important considerations for a communication system is the control over information security and access. In many cases, a sender of information wants to ensure that the intended recipient can only access the information, and that any other unintended recipients of the information are denied access. This information security and access control is typically provided by an encryption system that converts the information into a secret code for transmission over a public network. In an encryption system, the sender converts the original data, or “plaintext,” into a coded equivalent called “ciphertext” using an encryption algorithm. The ciphertext may then be decoded (or decrypted) by the receiver and thereby turned back into plaintext. The encryption algorithm uses a key, which is a binary number that is typically from 40 to 128 bits in length. The greater the number of bits in the key, the more possible key combinations and the longer it would take to break the code. The data is encrypted, or “locked,” by combining the bits in the key mathematically with the data bits. At the receiving end, the key is used to “unlock” the code and restore the original data.
There are two cryptographic methods in general use. The first method uses a secret key that is used by both the sender and receiver to encrypt and decrypt the plaintext information. A drawback of this method is that it is hard for the sender to deliver the secret key to the receiver without risking its compromise. The second method is known as public-key cryptography, which uses two keys known as a private and a public key. Each party has a private key that is kept secret and not shared, and a public key that is made publicly available. The public key is used to encrypt the plaintext information, and the private key is used to decrypt the ciphertext message. The private key may not be mathematically derived from the public key. The parties to a communication may exchange their public keys over an unsecured communication channel, such as the Internet, and thereafter use the public keys to encrypt their messages. The receivers then use the private key to decrypt the message.
Another important consideration for a communication system is the prevention of unauthorized copying of copyright-protected digital content. With conventional computing and communication systems, an unscrupulous individual can easily make and distribute an unlimited number of identical copies of a copyrighted work in digital form (e.g., music, literary works, photography, video, software, etc.). Moreover, commercially available file indexing services allow computer users to easily locate and access digital files on other user's computer systems, thereby greatly increasing the potential for widespread copyright piracy. One such service provided by Napster, Inc., of San Mateo, Calif., provides a file sharing application that works in conjunction with Napster's Web site to locate music files in the popular MP3 format residing on other computers currently logged onto the Internet. A similar service known as Gnutella provides a file sharing system that allows users to search for software and documents on the GnutellaNet, a loose federation of users and organizations that make a wide variety of information available to the world at large. Gnutella differs from Napster, which is geared to music files and provides a centralized listing, whereas the GnutellaNet is a peer-to-peer network that contains all kinds of files. While these file sharing systems also have a legitimate purpose in enabling users to share non-copyright-protected files, they are also widely used to obtain copyright-protected files in violation of copyright laws. The illicit use of these file sharing systems represents a serious threat to copyright owners.
Active policing of the Internet is not a viable solution for copyright holders. Such policing efforts are logistically difficult given the widespread and anonymous nature of Internet copyright piracy. In addition, the popular sentiment that information content exchanged on the Internet should be free makes large scale policing efforts very unattractive from a public relations standpoint. To address this problem, various digital rights management (DRM) systems have emerged for protecting the copyrights of digital content that is distributed by focusing on preventative measures. For example, a proposed DRM system for the recording industry known as the Secure Digital Music Initiative (SDMI) sets forth a set of rules for securely distributing digital music over the Internet. SDMI provides guidelines for developing compliant DRM systems, including a container format that software and hardware players must support in order to play back the material. Announced in February 1999, the SDMI is backed by the Recording Industry Association of America (RIAA) and Sony, Warner, BMG, EMI and Universal, the top five music production companies.
Notwithstanding these efforts, DRM systems present at best an incomplete solution for a number of reasons. First, given the availability of pirated content on the Internet, it is far more convenient and inexpensive for a user to unlawfully download a digital file over the Internet than to purchase a legitimate copy of the material via conventional channels of trade. While the unlawfully obtained material may have reduced quality in comparison to the legitimate copy, the convenience and negligible cost often make up for this drawback.
Second, most DRM technologies rely upon some form of encryption to protect the digital information. To be most effective, both parties to an encryption scheme must have a vested interest in maintaining the secrecy of the encrypted information. A legal purchaser of content has a right to view the content, but has no vested interest in ensuring that the secrecy afforded by encryption is maintained. For this reason, many DRM solutions utilize digital certificates or licenses that attempt to hide the decryption key from the user. In such systems, all copies of the content are encrypted in an identical manner, and the media player validates the user's right to display or play back the decrypted content. Since the encrypted content and decryption key are nevertheless accessible to the user albeit hidden, a sophisticated user may reverse engineer the DRM solution to strip away the encryption to thereby permit unimpeded copying and distribution of the decrypted content. Other less sophisticated ways of obtaining an unencrypted copy of the content are also available to unscrupulous users, such as videotaping each frame of a digital video data file as that content is legally displayed during playback.
Accordingly, it would be very desirable to provide a way to control the interchange of digital information that overcomes these and other drawbacks. More particularly, it would be desirable to provide an information interchange system and method that allows control over security and access to the information, and which prevents unauthorized copying of copyright-protected content.
A method and apparatus for controlling access to digital information in accordance with the present invention utilizes a location identity attribute that defines a specific geographic location. The location identity attribute is associated with the digital information such that the digital information can be accessed only at the specific geographic location. The location identity attribute further includes a location value and a proximity value. The location value corresponds to a location of an intended recipient appliance of the digital information, and may be further defined in terms of latitude, longitude and altitude dimensions. The proximity value corresponds to a zone that encompasses the location. The location identity attribute may further include a temporal value such that the digital information can only be accessed at the specific geographic location and during a particular time period.
According to a general embodiment of the invention, access to the digital information is allowed only at the specific geographic location defined by the location identity attribute. As a first part of this enforcement process, the location of an appliance through which access to the digital information is sought is identified. There are many ways to identify the location of the appliance, including: (1) resolving the appliance location from a street address for the appliance; (2) retrieving the appliance location from a file stored within the appliance; (3) recovering the appliance location from a GPS receiver embedded in the appliance; and (4) recovering the appliance location by triangulating RF signals received by the appliance. After the appliance location is identified, it is compared to the specific geographic location defined by the location identity attribute. Access to the digital information is allowed only if the appliance location falls within the specific geographic location.
In a more specific embodiment of the invention based on the foregoing general embodiment, the digital information is encrypted using an encryption key based at least in part on the location identity attribute. The encryption key may be further based on an area parameter that is determined from the location identity attribute and is included with the encrypted digital information. The area parameter describes a shape of a geographic area, but does not identify where the geographic area is located. The area parameter is deterministically combined with the location identity attribute to yield the encryption key. The appliance that receives the encrypted digital information can generate a decryption key to decrypt the digital information based on the received area parameter and the appliance location determined in accordance with any of the foregoing methods. If the appliance location is not within the proximate area of the location identity attribute, the appliance will be unable to generate a decryption key to decrypt the digital information. Thus, allowing decryption of the digital information only at the specific geographic location enforces the location identity.
In another specific embodiment of the invention based on the foregoing general embodiment, the location identity attribute is integrated with the digital information in a portion of a file containing the digital information. A software application or operating system that accesses the file would enforce the location identity by allowing access to the file only at the specific geographic location defined by the location identity attribute.
In yet another specific embodiment of the invention based on the foregoing general embodiment, the location identity attribute is enforced by a hardware controller associated with hardware element of an appliance, such as a hard disk controller or video controller. The digital information could only be retrieved from memory, or displayed on a video monitor, if the hardware element is located at the specific geographic location defined by the location identity attribute.
A more complete understanding of the system and method for using location identity to control access to digital information will be afforded to those skilled in the art, as well as a realization of additional advantages and objects thereof, by a consideration of the following detailed description of the preferred embodiment. Reference will be made to the appended sheets of drawings, which will first be described briefly.
The present invention satisfies the need for a way to control the interchange of digital information that allows control over security and access to the information, and which prevents unauthorized copying of copyright-protected content. In the detailed description that follows, like element numerals are used to describe like elements illustrated in one or more of the figures. Various terms are used throughout the detailed description, including the following:
Appliance. Electronic devices, systems, networks, and the like with the minimum capacity to acquire digital information, transmit the information, and acquire location information. These electronic devices will often include a processing capability to execute program instructions and a memory capacity for short term and long term data storage.
Associating Location Identity. The method of marking digital information with a location identity attribute.
Digital Information. Digital information is information that is represented in digital format. Examples of information that can be represented digitally include text, data, software, music, video, graphics, etc.
Enforcing Location Identity. The method of providing or denying access to digital information through its associated location identity attribute.
Geocode. A unique coding of a location on earth usually associated with a coordinate system. Some geocodes identify a point location, such as when a place is identified by its latitude and longitude. Other geocodes may identify a region such as a zip code.
Geolock. An enforced association between digital information and a geographic area defined by a location identity attribute.
Geolocked Information. Digital information that has been associated with a location identity attribute, and that can only be accessed within an area defined by the location identity attribute.
Location. Any geographic place. It may be, but is not limited to, a precise point location, an area or region location, a point location included within a proximate area, or combinations of places on earth. Location can also include height (or altitude) to identify position above or below the surface of the earth, or time to identify position in a temporal dimension.
Location Identity. A precise coding of a location. It can be used, but is not limited to, an attribute of information to precisely define the location at which the information is to be accessed. Location identity may be a coding of a point location, a region, a region with an associated point location, a corridor (i.e., center line with length on either side of the center line), or by any other precise identification of a location in space and time.
Location Variance. The minimum resolution at which a geocode of a location may fail to exactly distinguish it from adjacent locations. For example, if a military grid reference system is used with two characters of precision, then any location is precise to within only ten kilometers.
Playback Location. A location at which playback of digital information will be allowed.
Proximity. The zone or area that includes the location.
The foregoing definitions are not intended to limit the scope of the present invention, but rather are intended to clarify terms that are used in describing the present invention. It should be appreciated that the defined terms may also have other meanings to persons having ordinary skill in the art. These and other terms are used in the detailed description below.
Referring now to
Any geographic region or area that contains the location value 142 of the location identity can serve as the proximity value 143 for the location identity attribute 140. The proximity value 143 may comprise a rectangular region defined by two adjacent longitude lines (providing horizontal edges) and two adjacent latitude lines (providing vertical edges). Alternatively, the proximity value 143 may comprise a circular region represented by a single number defining the radius around the location. The circular region can be further defined as an elliptical area either centered at the location, or a circular or elliptical area that contains the location but not necessarily as the centroid. In another alternative, the proximity value 143 may comprise an irregular closed polygon, or a corridor. In yet another alternative, the proximity value 143 may correspond to a known geographic region, such as the country of Brazil. Other types of known geographic regions that can define the proximity value 143 can include postal zip codes, states, counties, incorporated cities, etc.
In accordance with the invention, whenever digital information is saved, stored, or copied, a location identity attribute 140 is associated with the digital information so that subsequent access of the digital information is limited to the geographic area specified by the location identity attribute 140.
It should be appreciated that this method is analogous to the setting of a file attribute, such as a read-only attribute, for a computer file when the file is saved. The method would be performed by a system or device having a data processing capability and memory sufficient to generate, handle or process digital information for communication or distribution to another party, such as a personal computer, server, personal digital assistant (PDA), laptop, workstation, network, and the like. Software or embedded firmware instructions operating on the system or device would cause the method to be performed.
More particularly, the method starts at step 200 with a command to save or store digital information with a location identity attribute. At step 202, a location value 142 for the digital information is retrieved and stored for later use. The location value 142 is not necessarily the geographical location at which the method is invoked on the appliance, but rather corresponds to the location identity attribute (described above) for an appliance at which access to the digital information will be allowed. At step 204, a proximity value 143 of the location identity attribute of the appliance is retrieved and stored for later use. Various methods for generating the location and proximity values 142, 143 will be described in greater detail below. In addition to such methods, the location and proximity values 142, 143 may also be pre-stored and retrieved from memory, or the end user may be queried to provide the information. At step 206, the retrieved location and proximity values 142, 143 are used to generate the location identity attribute 140. Then, at step 210, the digital information 216 is associated with the location identity attribute 140 to provide geolocked digital information 218.
Attempts to access geolocked information through a read or copy operation performed by a playback appliance will be denied unless the appliance confirms a valid location identity. This is performed by evaluating the associated location identity of the digital information against the location of the playback appliance to determine whether there is a match.
Particularly, the method starts at step 220 with a command to access the digital information. At step 222, the geolocked digital information 218 is accessed to read and store the associated location identity attribute 140. It should be appreciated that only the location identity portion of the geolocked information is accessed, and not the digital information itself. The location identity 140 of the geolocked information is stored for further use in the method. At step 224, the method determines the location of the appliance accessing the digital information. As will be described below, there are numerous possible ways to determine the appliance location 160. The appliance location 160 is stored for further use in the method. At step 226, the method determines whether the location of the appliance is consistent with the region defined by the location identity 140. If the appliance location 160 is consistent with the location identity 140, then access to the geolocked digital information 218 is allowed at step 228. Conversely, if the appliance location 160 is not consistent with the location identity 140, then access is denied at step 230.
In accordance with an embodiment of the invention, the digital information is encrypted before transfer to an appliance and the location identity attribute 140 is used to generate a location identity based key used to encrypt the digital information. The layer of encryption added to the digital information enforces the limitation on access defined by the location identity attribute 140.
Attempts to access the encrypted geolocked information through a read or copy operation performed by a playback appliance will be denied unless the appliance enforces the location identity.
In another embodiment of the invention, the location identity attribute 140 is associated with a file containing digital information by an application or operating system of an appliance so that subsequent access of the digital information by the application or operating system is limited to the geographic area specified by the location identity attribute 140. Unlike the embodiment of
Attempts to access geolocked information through a read or copy operation performed by an application or operating system executing on the appliance will be denied unless the appliance complies with the location identity.
In yet another embodiment of the invention, the method for associating digital information with the location identity attribute 140 can be implemented in a hardware controller for an appliance. Every hardware device for an appliance (e.g., hard disk, DVD/CD-ROM, floppy disk, video display, etc.), has a corresponding hardware controller that performs a limited set of functions with the device in response to specific commands from a software operating system. As in the preceding embodiments, digital information is saved in association with a corresponding location identity attribute. Any attempt to read the digital information through a device level command will be carried out by the device hardware controller with respect to the location of the playback appliance and the location identity stored on the device.
Specifically, the hardware controller may be adapted to execute some or all aspects of the aforementioned methods, including steps 202–210 of the general method described above with respect to
There are numerous applications and data formats in which the location identity attribute can be used to control access to digital information. A user can receive geolocked digital information in electronic form using any conventional method, including via telephone line, fiber optic, cable television, satellite broadcast, wireless or other media. A user may also physically receive custom generated geolocked digital information from a store or vendor in the form of magnetic or other encoded media, e.g., CD-ROM, diskette, videocassette or tape. Similarly, geolocked digital information can be communicated over a network including wide area networks such as the Internet, local networks such as intranets, dial-up access between a personal and server computers, as an attachment to e-mail, or through a digital cell phone or other wireless device. Geolocked digital information can be stored on diskette, CD-ROM, tape, fixed or removable hard disk, DVD/CD-ROMs, flash memory/disks, EEPROMs, etc. The types of digital information that can be protected in this matter can include music files (e.g., MP3), software, literary works, commercial transaction files, text files, video/graphics, paging messages, cell phone conversation and commerce, and digital film, to name a few.
In an exemplary application of the present invention, the location identity attribute may be used to combat the problem of piracy and unauthorized use and copying of digital film. A customer would rent or buy digital video media (e.g., DVD) in a manner analogous to that when renting or purchasing film at a commercial video rental store. The location identity attribute is utilized at the time of purchase of the digital video media. Specifically, the location identity attribute corresponding to the customer's home address would be physically stored on a re-writable portion of the digital video media. The DVD player in the customer's home will be coded to enforce the location identity attribute in order to limit the playback of the digital video media to the particular geographic region and time period. Even if the media is copied, lost or stolen, it can only be viewed within its playback region and time span, and thus serves as a robust solution to the problems associated with unauthorized use of digital media.
In another exemplary application, a customer orders digital film or audio through a vendor's catalog. The catalog may be hardcopy or Internet-based, and the order may be placed via postal mail, telephone, facsimile transmission or Internet-based transaction. By whatever method the order is placed, the customer's order indicates the playback location. When the order is filled by the vendor, the location identity attribute associated with the customer is determined and used to generate an encryption key which is then used to encrypt the digital information file for the media. The purchased media is then custom encrypted for the order, copied to a format such as DVD or CD-ROM, and packaged with a viewer that is also customized for the location identity attribute. Even if the entire contents of the purchased media are copied, the viewer and media, customized with the location identity attribute, prevent viewing except in the allowable region. In this exemplary application, the use of location identity and customized encryption and viewers provides a robust solution to the problem of piracy and unauthorized use and copying of digital media.
In another exemplary application of the invention, location identity is used to “narrowcast” information over public networks. Narrowcasting refers to the transmission of information to a limited audience (in contrast with broadcasting whereby information is transmitted to a large audience). Many types of information are useable only within a location context, e.g., local weather, traffic information, movie schedules, store information, etc. Applications that use such location-dependent information may be referred to as location-based applications. Location identity provides a way to use a broadcast type protocol to send information over a network that is identified by the location for which it is pertinent, e.g., local area for weather, store location for sale and advertising information, etc. Using the location of the client appliance, the client applications can utilize the location identity attached to the information to screen information selectively based on their current location. It can also provide a way to establish a unique location-based shared cryptographic key to maintain secure confidential communications for geographically limited narrowcast applications.
In another exemplary application of the present invention, location identity is used to enhance confidentiality and security for wireless network connectivity. Wireless networking is coming of age with the advent of networking equipment and protocols such as the “Bluetooth” technology that allows wireless portable or workstations to connect to a network. “Bluetooth” is an open standard for short-range transmission of digital voice and data between mobile devices (e.g., laptops, PDAs, cellular telephones) and desktop devices that supports point-to-point and multipoint applications. Since every wireless appliance communicating over the network will have a unique location, location identity can be utilized to establish a unique shared cryptographic key that can be used to maintain secure confidential communications for wireless devices connecting over a public network.
In still another exemplary application of the present invention, location identity is used to enhance confidentiality and security for users of web applications. Internet “cookies” provide a way to allow web applications to maintain state between separate web pages, and are widely implemented by allowing the server to set and store name/value pairs on the user's computer. A server delivers a cookie to the user computer containing a unique state identifier that is established and shared by the client and server. Allowing the server to set and store information on a user's computer, however, has raised confidentiality and security concerns. The present invention provides a new way to enhance confidentiality and security by allowing the client application to generate the unique state identifier, which can be shared with the server, and used to maintain state for a web-based application.
In each of the foregoing embodiments and exemplary applications, there are at least four logical boundaries that exist between the application program that accesses geolocked digital information and the peripheral and network environment in which these applications operate. These boundaries include: (1) the data acquisition/appliance boundary; (2) the storage/appliance boundary; (3) the user interface/appliance boundary; and (4) the appliance/acquiring location boundary. The data acquisition/appliance boundary refers to the enforcement of location identity at the point of acquisition of digital information by an appliance, e.g., the appliance that cannot acquire the digital information from another source unless the location identity attribute is satisfied. The storage/appliance boundary refers to the enforcement of location identity at the point of storage of digital information by an appliance, e.g., the appliance cannot recall a stored file from memory unless the location identity attribute is satisfied. The user interface/appliance boundary refers to the enforcement of location identity at the point of presenting the information to the user, e.g., the user cannot view the digital information on the monitor of the appliance unless the location identity attribute is satisfied. The appliance/acquiring location boundary refers to the limitations upon access to geolocked data by validating the appliance location, e.g., the user cannot view, store, retrieve or otherwise utilize the digital information in any manner unless the appliance location is acquired using an embedded GPS receiver. It should be appreciated that the relative security provided by any particular implementation of the present invention is related to the boundary at which access control is enforced.
Having thus described a preferred embodiment of a system and method for using location identity to control access to digital information, it should be apparent to those skilled in the art that certain advantages of the invention have been achieved. It should also be appreciated that various modifications, adaptations, and alternative embodiments thereof may be made within the scope and spirit of the present invention. The invention is further defined by the following claims.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4418425||31 Aug 1981||29 Nov 1983||Ibm Corporation||Encryption using destination addresses in a TDMA satellite communications network|
|US4468793 *||1 Dec 1980||28 Aug 1984||Texas Instruments Incorporated||Global position system (GPS) multiplexed receiver|
|US4709266||14 Jan 1985||24 Nov 1987||Oak Industries Inc.||Satellite scrambling communication network using geographically separated uplinks|
|US4860352||20 May 1985||22 Aug 1989||Satellite Financial Systems Corporation||Satellite communication system and method with message authentication suitable for use in financial institutions|
|US4887296||16 Oct 1987||12 Dec 1989||Ricoh Co., Ltd.||Cryptographic system for direct broadcast satellite system|
|US4993067||27 Dec 1988||12 Feb 1991||Motorola, Inc.||Secure satellite over-the-air rekeying method and system|
|US5243652||30 Sep 1992||7 Sep 1993||Gte Laboratories Incorporated||Location-sensitive remote database access control|
|US5532838||14 Apr 1995||2 Jul 1996||Barbari; Edward P.||Method & apparatus for dynamically creating and transmitting documents via facsimile equipment|
|US5577122 *||29 Dec 1994||19 Nov 1996||Trimble Navigation Limited||Secure communication of information|
|US5640452||28 Apr 1995||17 Jun 1997||Trimble Navigation Limited||Location-sensitive decryption of an encrypted message|
|US5659617||22 Sep 1994||19 Aug 1997||Fischer; Addison M.||Method for providing location certificates|
|US5727057 *||27 Dec 1994||10 Mar 1998||Ag Communication Systems Corporation||Storage, transmission, communication and access to geographical positioning data linked with standard telephony numbering and encoded for use in telecommunications and related services|
|US5740252||13 Oct 1995||14 Apr 1998||C/Net, Inc.||Apparatus and method for passing private demographic information between hyperlink destinations|
|US5754657||10 Mar 1997||19 May 1998||Trimble Navigation Limited||Authentication of a message source|
|US5757916||6 Oct 1995||26 May 1998||International Series Research, Inc.||Method and apparatus for authenticating the location of remote users of networked computing systems|
|US5790074||15 Aug 1996||4 Aug 1998||Ericsson, Inc.||Automated location verification and authorization system for electronic devices|
|US5799083||26 Aug 1996||25 Aug 1998||Brothers; Harlan Jay||Event verification system|
|US5898680||5 Nov 1996||27 Apr 1999||Worldspace, Inc.||System for providing location-specific data to a user|
|US5915019||8 Jan 1997||22 Jun 1999||Intertrust Technologies Corp.||Systems and methods for secure transaction management and electronic rights protection|
|US5920861||25 Feb 1997||6 Jul 1999||Intertrust Technologies Corp.||Techniques for defining using and manipulating rights management data structures|
|US5922073||27 Dec 1996||13 Jul 1999||Canon Kabushiki Kaisha||System and method for controlling access to subject data using location data associated with the subject data and a requesting device|
|US5943422||12 Aug 1996||24 Aug 1999||Intertrust Technologies Corp.||Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels|
|US5956716||7 Jun 1996||21 Sep 1999||Intervu, Inc.||System and method for delivery of video data over a computer network|
|US5978747||20 Apr 1998||2 Nov 1999||Bellsouth Intellectual Property Corporation||Method for identifying the geographic region of a geographic area which contains a geographic zone|
|US5982897||10 Jun 1998||9 Nov 1999||Itt Corporation||Selective denial of encrypted high precision data by indirect keying|
|US5987136||16 Dec 1997||16 Nov 1999||Trimble Navigation Ltd.||Image authentication patterning|
|US5991739||24 Nov 1997||23 Nov 1999||Food.Com||Internet online order method and apparatus|
|US5991876||1 Apr 1996||23 Nov 1999||Copyright Clearance Center, Inc.||Electronic rights management and authorization system|
|US6003030||18 Oct 1996||14 Dec 1999||Intervu, Inc.||System and method for optimized storage and retrieval of data on a distributed computer network|
|US6006332||21 Oct 1997||21 Dec 1999||Case Western Reserve University||Rights management system for digital media|
|US6041411||28 Mar 1997||21 Mar 2000||Wyatt; Stuart Alan||Method for defining and verifying user access rights to a computer information|
|US6046689||12 Nov 1998||4 Apr 2000||Newman; Bryan||Historical simulator|
|US6057779||14 Aug 1997||2 May 2000||Micron Technology, Inc.||Method of controlling access to a movable container and to a compartment of a vehicle, and a secure cargo transportation system|
|US6070174||13 Jul 1998||30 May 2000||Infraworks Corporation||Method and apparatus for real-time secure file deletion|
|US6104815||9 Jan 1998||15 Aug 2000||Silicon Gaming, Inc.||Method and apparatus using geographical position and universal time determination means to provide authenticated, secure, on-line communication between remote gaming locations|
|US6317500||16 Jun 1997||13 Nov 2001||Trimble Navigation Limited||Method and apparatus for location-sensitive decryption of an encrypted signal|
|US6370629 *||29 Oct 1998||9 Apr 2002||Datum, Inc.||Controlling access to stored information based on geographical location and date and time|
|EP0997808A2||27 Oct 1999||3 May 2000||Datum, Inc.||Controlling access to stored information|
|WO1999051038A2||30 Mar 1999||7 Oct 1999||Piccionelli Greg A||Communication network based on geographic location|
|WO2000027143A1||3 Nov 1999||11 May 2000||Signalsoft Corporation||Multiple input data management for wireless location-based applications|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7352865 *||17 Jun 2003||1 Apr 2008||Seiko Epson Corporation||Printer server and print system and data receiving device and data sending/receiving system|
|US7392057 *||22 Oct 2004||24 Jun 2008||Samsung Electronics Co., Ltd||Message service method for mobile communication terminal using position information|
|US7444388||13 Apr 2006||28 Oct 2008||Concert Technology Corporation||System and method for obtaining media content for a portable media player|
|US7660418 *||10 Oct 2006||9 Feb 2010||Geocodex Llc||Cryptographic system and method for geolocking and securing digital information|
|US7752135 *||16 Jan 2002||6 Jul 2010||International Business Machines Corporation||Credit authorization system and method|
|US7765192 *||29 Mar 2006||27 Jul 2010||Abo Enterprises, Llc||System and method for archiving a media collection|
|US7784070 *||7 May 2007||24 Aug 2010||Prime Electronics And Satellitics Incorporation||Satellite signal receive and method of conditionally accessing digital TV program by using the same|
|US7792297||30 Mar 1999||7 Sep 2010||Piccionelli Greg A||System and process for limiting distribution of information on a communication network based on geographic location|
|US7904483||23 Dec 2006||8 Mar 2011||Geopeg, Inc.||System and method for presenting geo-located objects|
|US7917543||1 Oct 2009||29 Mar 2011||Geopeg, Inc.||System and method for geo-coding user generated content|
|US7945586 *||29 Mar 2007||17 May 2011||Trend Micro Incorporated||Methods and apparatus to protect data|
|US8001053 *||4 Oct 2004||16 Aug 2011||Contentguard Holdings, Inc.||System and method for rights offering and granting using shared state variables|
|US8060477||23 Jun 2010||15 Nov 2011||Abo Enterprises, Llc||System and method for archiving a media collection|
|US8099772 *||28 May 2008||17 Jan 2012||Sony Corporation||Information terminal apparatus, information processing apparatus and information communication system|
|US8135773 *||4 Feb 2004||13 Mar 2012||Panasonic Avionics Corporation||System and method for downloading files|
|US8185579||19 Sep 2008||22 May 2012||Eloy Technology, Llc||System and method for obtaining media content for a portable media player|
|US8218766 *||16 Oct 2002||10 Jul 2012||Sirf Technology, Inc.||Systems and methods for facilitating transactions in accordance with a region requirement|
|US8307092||21 Feb 2007||6 Nov 2012||Napo Enterprises, Llc||Method and system for collecting information about a user's media collections from multiple login points|
|US8312064 *||11 May 2005||13 Nov 2012||Symantec Corporation||Method and apparatus for securing documents using a position dependent file system|
|US8356328||20 Apr 2009||15 Jan 2013||Minter David D||Methods and systems for selecting content for an Internet television stream using mobile device location|
|US8402268||11 Jun 2010||19 Mar 2013||Panasonic Avionics Corporation||System and method for providing security aboard a moving platform|
|US8447787||5 Jun 2012||21 May 2013||Geopeg, Inc.||System and method for geocoding content|
|US8447792||30 Aug 2012||21 May 2013||Geopeg, Inc||System and method for presenting user generated geo-located objects|
|US8452227||1 Apr 2009||28 May 2013||David D. Minter||Methods and systems for selecting internet radio program break content using mobile device location|
|US8504217||14 Dec 2010||6 Aug 2013||Panasonic Avionics Corporation||System and method for providing dynamic power management|
|US8509990||15 Dec 2009||13 Aug 2013||Panasonic Avionics Corporation||System and method for performing real-time data analysis|
|US8583924 *||29 Jun 2010||12 Nov 2013||Hand Held Products, Inc.||Location-based feature enablement for mobile terminals|
|US8620699||8 Aug 2006||31 Dec 2013||Napo Enterprises, Llc||Heavy influencer media recommendations|
|US8644756||9 Sep 2013||4 Feb 2014||David D. Minter||Methods and systems for selecting internet radio program break content using mobile device location|
|US8704960||26 Apr 2011||22 Apr 2014||Panasonic Avionics Corporation||Deployment system and method for user interface devices|
|US8731369||17 Dec 2004||20 May 2014||Sonic Ip, Inc.||Multimedia distribution system for multimedia files having subtitle information|
|US8897924||15 Jul 2013||25 Nov 2014||Panasonic Avionics Corporation||System and method for providing dynamic power management|
|US8898105||2 Apr 2012||25 Nov 2014||Amazon Technologies, Inc.||Scalable partitioning in a multilayered data service framework|
|US8904539||7 Mar 2013||2 Dec 2014||Ricoh Co., Ltd.||Location constraints for template access and form activities|
|US8948684||29 Jan 2014||3 Feb 2015||David D. Minter||Methods and systems for selecting internet radio program break content using mobile device location|
|US9016627||1 Oct 2010||28 Apr 2015||Panasonic Avionics Corporation||System and method for providing an integrated user interface system at a seat|
|US9025659||1 Sep 2011||5 May 2015||Sonic Ip, Inc.||Systems and methods for encoding media including subtitles for adaptive bitrate streaming|
|US9037639||18 Apr 2012||19 May 2015||Eloy Technology, Llc||System and method for obtaining media content for a portable media player|
|US9108733||12 Sep 2011||18 Aug 2015||Panasonic Avionics Corporation||Integrated user interface system and method|
|US9124584 *||24 Apr 2006||1 Sep 2015||Arvato Digital Services Llc||Location-specific or range-based licensing system|
|US9232283||10 Jan 2013||5 Jan 2016||David D. Minter||Methods and systems for selecting content for an internet television stream using mobile device location|
|US9239838 *||2 Apr 2012||19 Jan 2016||Amazon Technologies, Inc.||Scalable partitioning in a multilayered data service framework|
|US9307297||20 Feb 2014||5 Apr 2016||Panasonic Avionics Corporation||System and method for providing multi-mode wireless data distribution|
|US9369687||19 May 2014||14 Jun 2016||Sonic Ip, Inc.||Multimedia distribution system for multimedia files with interleaved media chunks of varying types|
|US9420287||7 Jun 2013||16 Aug 2016||Sonic Ip, Inc.||Multimedia distribution system|
|US9477825 *||5 Apr 2016||25 Oct 2016||Trusted Mobile, Llc||System for transparent authentication across installed applications|
|US9621522||15 Dec 2015||11 Apr 2017||Sonic Ip, Inc.||Systems and methods for playing back alternative streams of protected content protected using common cryptographic information|
|US9646444||13 Feb 2015||9 May 2017||Mesa Digital, Llc||Electronic wireless hand held multimedia device|
|US9712324 *||19 Mar 2013||18 Jul 2017||Forcepoint Federal Llc||Methods and apparatuses for reducing or eliminating unauthorized access to tethered data|
|US9712890||27 Jul 2015||18 Jul 2017||Sonic Ip, Inc.||Network video streaming with trick play based on separate trick play files|
|US9754276 *||21 Dec 2011||5 Sep 2017||Paypal Inc.||Digital content provided to a user at a physical location|
|US20020023010 *||20 Mar 2001||21 Feb 2002||Rittmaster Ted R.||System and process for distribution of information on a communication network|
|US20030108202 *||12 Apr 2002||12 Jun 2003||Clapper Edward O.||Location dependent encryption and/or decryption|
|US20030135463 *||16 Jan 2002||17 Jul 2003||International Business Machines Corporation||Credit authorization system and method|
|US20030177094 *||15 Mar 2002||18 Sep 2003||Needham Bradford H.||Authenticatable positioning data|
|US20040002345 *||17 Jun 2003||1 Jan 2004||Nec Corporation||Network connection management system and network connection management method used therefor|
|US20040010553 *||15 Jul 2002||15 Jan 2004||International Business Machines Corporation||Peer to peer location based services|
|US20040205194 *||16 Oct 2002||14 Oct 2004||Anant Sahai||Systems and methods for facilitating transactions in accordance with a region requirement|
|US20050039044 *||17 Jun 2003||17 Feb 2005||Kazuhito Gassho||Printer server and print system and data receiving device and data sending/receiving system|
|US20050044564 *||4 Feb 2004||24 Feb 2005||Matsushita Avionics Systems Corporation||System and method for downloading files|
|US20050071666 *||30 Sep 2003||31 Mar 2005||International Business Machines Corporation||Location sensitive software execution|
|US20050086391 *||30 Sep 2003||21 Apr 2005||International Business Machines Corporation||Location sensitive software download|
|US20050096069 *||22 Oct 2004||5 May 2005||Samsung Electronics Co., Ltd.||Message service method for mobile communication terminal using position information|
|US20050137984 *||4 Oct 2004||23 Jun 2005||Mai Nguyen||System and method for rights offering and granting using shared state variables|
|US20050207442 *||17 Dec 2004||22 Sep 2005||Zoest Alexander T V||Multimedia distribution system|
|US20060026184 *||24 Jun 2004||2 Feb 2006||Texas Instruments Incorporated||Generation and use of files having embedded location information|
|US20060059093 *||1 Sep 2005||16 Mar 2006||Canon Kabushiki Kaisha||Data processing apparatus, data processing method, and computer program|
|US20060094445 *||28 Oct 2005||4 May 2006||Pantech Co., Ltd.||Method and apparatus of restricting data access|
|US20060173782 *||3 Feb 2005||3 Aug 2006||Ullas Gargi||Data access methods, media repository systems, media systems and articles of manufacture|
|US20060277312 *||24 Apr 2006||7 Dec 2006||Karl Hirsch||Location-specific or range-based licensing system|
|US20070030972 *||10 Oct 2006||8 Feb 2007||Glick Barry J||Cryptographic system and method for geolocking and securing digital information|
|US20070173956 *||23 Dec 2006||26 Jul 2007||Koch Edward L||System and method for presenting geo-located objects|
|US20070200674 *||14 Feb 2006||30 Aug 2007||Garmin Ltd., A Cayman Islands Corporation||Electronic device having a location-based security feature|
|US20080136969 *||7 May 2007||12 Jun 2008||Prime Electronics And Satellitics Incorporation||Satellite signal recieve and method of conditionally accessing digital tv program by using the same|
|US20080201446 *||21 Feb 2007||21 Aug 2008||Concert Technology Corporation||Method and system for collecting information about a user's media collections from multiple login points|
|US20080232586 *||28 May 2008||25 Sep 2008||Sony Corporation||Information terminal apparatus, information processing apparatus and information communication system|
|US20080263094 *||20 Apr 2007||23 Oct 2008||Joshua Bass||Multi-rendered multimedia site generation apparatus, systems, and methods|
|US20080307053 *||1 Nov 2007||11 Dec 2008||Mitnick Craig R||System and Method for Permitting Geographically-Pertinent Information to be Ranked by Users According to Users' Geographic Proximity to Information and to Each Other for Affecting the Ranking of Such Information|
|US20090055510 *||19 Sep 2008||26 Feb 2009||Concert Technology Corporation||System and method for obtaining media content for a portable media player|
|US20090063646 *||2 Sep 2008||5 Mar 2009||Nixle, Llc||System and method for collecting and organizing popular near real-time data in a virtual geographic grid|
|US20090077084 *||29 Mar 2006||19 Mar 2009||Concert Technology Corporation||System and method for archiving a media collection|
|US20100088768 *||3 Oct 2008||8 Apr 2010||Invensys Systems, Inc.||Industrial process visualization application having an operating system locale-based regionally limited license|
|US20100112935 *||1 Apr 2009||6 May 2010||Minter David D||Methods and systems for selecting internet radio program break content using mobile device location|
|US20100122288 *||20 Apr 2009||13 May 2010||Minter David D||Methods and systems for selecting content for an internet television stream using mobile device location|
|US20100146397 *||1 Oct 2009||10 Jun 2010||Edward Lee Koch||System and method for geo-coding user generated content|
|US20100152962 *||15 Dec 2009||17 Jun 2010||Panasonic Avionics Corporation||System and Method for Performing Real-Time Data Analysis|
|US20100318794 *||11 Jun 2010||16 Dec 2010||Panasonic Avionics Corporation||System and Method for Providing Security Aboard a Moving Platform|
|US20110004756 *||29 Jun 2010||6 Jan 2011||Hand Held Products, Inc.||Gps-based provisioning for mobile terminals|
|US20110141057 *||4 Oct 2010||16 Jun 2011||Panasonic Avionics Corporation||System and Method for Interacting with Information Systems|
|US20110184579 *||14 Dec 2010||28 Jul 2011||Panasonic Avionics Corporation||System and Method for Providing Dynamic Power Management|
|US20120110339 *||1 Nov 2010||3 May 2012||Par Technology Corporation||Security Software For Vector File Format Data|
|US20120159568 *||15 Dec 2011||21 Jun 2012||Haixiang He||Method and Apparatus for Limiting Digital Content Consumption Inside Defined Real-world Geographic Area(s)|
|US20130166369 *||21 Dec 2011||27 Jun 2013||Ebay Inc.||Digital Content Provided to a User at a Physical Location|
|US20130212398 *||28 Mar 2013||15 Aug 2013||Bce Inc.||Method and system for validating a device that uses a dynamic identifier|
|US20140173237 *||2 Dec 2013||19 Jun 2014||Fujitsu Limited||Storage device, and method for protecting data in storage device|
|US20140289524 *||19 Mar 2013||25 Sep 2014||Raytheon Company||Methods and apparatuses for reducing or eliminating unauthorized access to tethered data|
|USRE45052 *||14 Apr 2011||29 Jul 2014||Sonic Ip, Inc.||File format for multiple track digital data|
|U.S. Classification||380/258, 713/163, 705/51, 380/264|
|International Classification||H04L29/06, G06F12/14, G06F1/00, H04L9/00, H04L9/08, G06F21/00, G06F21/24, G01S19/48|
|Cooperative Classification||G06F2211/007, H04L63/0428, G06F21/10, G06F2221/2111, H04L63/06, H04L63/1408, G06F2221/0708, H04L63/0421, H04L63/0492, H04L2463/101|
|European Classification||H04L63/04B16, H04L63/14A, H04L63/06, G06F21/10, H04L63/04B, H04L63/04A4|
|6 Jun 2003||AS||Assignment|
Owner name: GEOCODEX LLC, CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GLICK, BARRY J.;KARPF, RONALD S.;SEILER, MARK E.;REEL/FRAME:014140/0179;SIGNING DATES FROM 20030425 TO 20030527
|22 Jun 2009||FPAY||Fee payment|
Year of fee payment: 4
|23 Aug 2013||REMI||Maintenance fee reminder mailed|
|11 Dec 2013||FPAY||Fee payment|
Year of fee payment: 8
|11 Dec 2013||SULP||Surcharge for late payment|
Year of fee payment: 7
|18 Aug 2017||FEPP|
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.)